Gulf analysis paper ... Cybersecurity and Stability in the Gulf. Middle East Program. January By James Andrew Lewis

Size: px
Start display at page:

Download "Gulf analysis paper ... Cybersecurity and Stability in the Gulf. Middle East Program. January 2014. By James Andrew Lewis"

Transcription

1 Middle East Program January 2014 Gulf analysis paper summary The Gulf has become a flashpoint for cyber conflict. Cyberspace has become an arena for covert struggle, with the United States, Israel and other nations on one side, and Iran and Russia on the other. Iran has far outpaced the GCC states in developing its cyber capabilities, both for monitoring internal dissent and deploying hackers to disrupt or attack foreign targets. Several such attacks over the past two years were likely either directed or permitted by Iranian state authorities. Even if Iran holds back from offensive actions as nuclear talks progress, the growth in Iranian capabilities remains a potential security threat for other Gulf states. The GCC countries have begun to develop their defensive capabilities, but they will need to expand their defenses and collaborate more effectively to deter future threats. Cybersecurity and Stability in the Gulf By James Andrew Lewis... 1 The Iranian attack on the Saudis was a real wake-up call in the region. Unnamed senior U.S. official, New York Times, June 9, 2013 Cyberattack is a new tool of national power. It provides a means of coercion, influence, and warfare. The use of cyber techniques as intelligence tools dates back to the 1980s; cyberattack by militaries dates back to the 1990s. 2 Using cyber tools and techniques as an instrument of national power is the norm in the Gulf. The Gulf has become a flashpoint for cyber conflict given the high level of activity and the chance for miscalculation and escalation into conventional conflict. The Gulf is unique in that the use of cyber techniques by governments for covert action is much more prevalent than in any region other than the Korean peninsula. The primary source of tension among Gulf states is the development by Iran of cyberattack capabilities that it has used and appears willing to use again. There is also a growing concern about Israeli cyber capabilities. This is an outgrowth of the larger disputes between Iran and Gulf Arab nations. Given the Gulf s strategic and economic significance, cyber attacks that damage oil production or escalate into physical conflict could have global consequences. The use of cyber tools and the expansion of cyber capabilities could change the balance of military power among regional states and undermine Gulf stability, particularly if the Gulf Cooperation Council (GCC) states do not expand their defenses in response to this new threat and find ways to better cooperate. Three key incidents have focused the attention of Gulf states on cybersecurity. The first was the effect of social media and the Internet in the Arab uprisings of 2011 and the 2009 Iranian Green Revolution. The Internet can amplify politi- gulf analysis papers In conjunction with its Gulf Roundtable series, the CSIS Middle East Program issues periodic policy papers addressing key economic and security issues in the Gulf region. Launched in April 2007, the Gulf Roundtable series convenes monthly and assembles a diverse group of regional experts, policymakers, academics, and business leaders seeking to build a greater understanding of the complexities of the region and identify opportunities for constructive U.S. engagement. Topics for discussion include the role of Islamist movements in politics, the war on terror, democratization and the limits of civil society, the strategic importance of Gulf energy, media trends, trade liberalization, and prospects for regional integration. The roundtable defines the Gulf as the United Arab Emirates, Saudi Arabia, Oman, Qatar, Bahrain, Kuwait, Iraq, and Iran and is made possible in part through the generous support of the Embassy of the United Arab Emirates rhode island ave nw, washington dc p f

2 2 CSIS Middle East Program Gulf Analysis Paper cal forces in ways that are difficult to predict or control. The second was the Stuxnet attacks launched against Iranian nuclear facilities in Stuxnet led to significant changes in Iranian policy, but it was not unique. Researchers around the world discovered significant malware programs Stars, Duqu, Flame, Shamoon used for espionage or attack against Gulf targets. 3 Finally, the 2012 attacks on Saudi Aramco and the Qatari firm RasGas, generally attributed to Iran, put most Gulf countries on notice of the new kind of risk they faced. In response to increased Iranian capabilities, the United States has begun to work with partner nations in the Gulf to improve their cyber defense capabilities. But almost all current cyber powers play some role in the Gulf. Israel has a close and active interest in Iran, and Israeli sources report that Iran routinely probes Israel s networks for vulnerabilities. Russia has worked with Iran in ways we do not fully understand and has sought to work with GCC states as well. There are reports that North Korea and Iran may be collaborating in developing cyberattack tools. The use of cyber techniques by governments in the Gulf for covert action is much more prevalent than in any region other than the Korean peninsula. Nations larger goals and interests determine how they use cyber techniques, guided by their strategies, experience, institutions, and tolerance for risk. It is not yet clear if, over time, the ability to acquire and employ cyber techniques will encourage states to be more assertive or confrontational. Access to the new cyber tools does not yet seem to have led countries to fundamentally change their policy objectives; intent better explains activity in cyberspace than does capability when it comes to conflict. We can assess the relative strength of different Gulf states cyber capabilities by looking at factors that predict those capabilities. These include institutions, strategies, and investments for cyber activities; the integration of cyber activities into existing military, intelligence, and diplomatic strategies; and the level of political attention given to cyber capabilities by national leaders, military commanders, or the heads of other ministries. Commitments and partnerships with other nations for cyber activities also predict relative strength. Iran s Cyber Capabilities Iran is far in the lead over the GCC states. Iran s trajectory in developing cyber capabilities is a good example of how a medium-sized government willing to commit a relatively small amount of resources can build cyber power. Iran sees cyberattack as another tool of its broader asymmetric warfare strategy for use against more powerful opponents. 4 Iran s own experiences have given it a keen appreciation for the utility of cyber techniques as instruments of national power and tools for coercion and force. Iran s concern over cyber threats originated with its need to repress dissent, and its development of cyber power is a reaction to the vulnerabilities created by the Internet. During the 2009 Green Revolution, Iranian security forces expanded their ability to monitor and disrupt online dissent as part of a broader crackdown on opposition activities. Iran s leaders fear the power of networks to unleash a more widespread popular uprising in Iran like those which toppled regimes in Tunisia and Egypt in Since then, Iranian security forces have expanded their ability to monitor and disrupt online dissent into an ability to use cyber techniques against other states, the most notorious example being the 2011 hack of the Netherlands Internet company DigiNotar, which allowed Iran to surreptitiously read Iranian dissidents s. 5 Repeated foreign intrusions led to high-level attention to cybersecurity and the creation of a sophisticated organizational structure to manage cyber conflict. In 2011 Iran s Supreme Leader Ayatollah Ali Khamenei authorized the establishment of a new Supreme Council of Cyberspace to coordinate efforts for both offense and defense. Council members include senior officials from the security and intelligence services and the ministers of culture and communications. Iran has a comprehensive cybersecurity strategy that includes the creation of what it calls a national information network that could disconnect most of Iran from the global Internet. Several prominent Iranian securi- center for strategic and international studies middle east program

3 CSIS Middle East Program Gulf Analysis Paper 3 cyberattack and showed the progress of Iranian capabilities. Iran s concern over cyber threats originated with its need to repress dissent, and its development of cyber power is a reaction to the vulnerabilities created by the Internet. ty officials have commented publicly on Iran s capabilities and the importance of cyberwarfare more broadly. Iran s Revolutionary Guard Corps (IRGC) Deputy Commander Abdollah Araghi said, We have equipped ourselves with new tools since cyberwar in the cyberspace is more dangerous than physical war, and Iranian officials, especially the Supreme Leader of the Islamic Revolution have all cited this point, therefore we are prepared for soft and physical wars. 6 Interior Minister Mostafa Najjar has also said that satellites and Facebook are the electronic means of a soft war by the West to cause the Iranian family s collapse. 7 Three Iranian military organizations have operational cyber roles: the IRGC, the Basij, and Iran s Passive Defense Organization. Iran held its first national cyber defense exercise in late October The Basij, a civilian paramilitary organization controlled by the IRGC, manages the Iranian Cyber Army, which Basij leaders say has 120,000 volunteer hackers. The number is certainly an exaggeration, but the Basij uses its already close connections with universities and religious schools to recruit a proxy hacker force. The Cyber Army is the likely source of a recent series of incidents aimed at Gulf energy companies, American banks, and Israel. The most important involved a major disruption involving the destruction of data on computers used by Saudi Aramco and RasGas. U.S. intelligence sources indicate that Iran was responsible for the attacks. The trigger for these incidents was most likely a cyberattack on Iran s major oil terminal at Kharg Island. Iran appears to have cleverly modified cybercrime malware for the attack. All the data on 30,000 Aramco computers was erased, and the malware may have infected (though it did not damage) refinery control systems. The Aramco incident, while not as sophisticated as Stuxnet, was second only to Stuxnet as a disruptive At the same time that the Aramco incident took place, there were massive denial of service attacks against U.S. banks. The likely trigger for the attacks on U.S. banks, which continue to this day, was the imposition of new sanctions by the U.S. Congress on Iran. 8 Denial of service is more like an online demonstration or protest than an attack; the target network is flooded with spurious traffic that causes it to fail, but the perpetrator does not gain access to the target network. The Iranian efforts follow the Russian pattern of using proxy hackers for political coercion, as when Russian hackers used denial of service attacks against Estonia in The harassment of American banks, however, was many times larger than the attacks on Estonia and at first overwhelmed the banks ability to respond. Attacks of this size require computing resources that, in a country where the Internet is tightly controlled, indicate government approval, if not direction, was involved. There are some reports that Iran has turned to outside help in developing malware, either to Russian cyber criminals (who are among the best in the world) or, paralleling its proliferation activities, to North Korea. It is too early to tell if progress in negotiations between Iran and Western countries on its nuclear program decreases the risk of a cyber incident. Iran is likely to be on its best behavior during the negotiations to avoid damaging any progress toward sanctions relief (although it is possible that Iranian opponents to the negotiations could use a cyber incident in an effort to derail the talks). Even if there is progress, the growth in Iranian capabilities remains a potential security threat for GCC states. Cyber Capabilities among the GCC States The combination of the attacks on Aramco and the banks is best seen as a test by Iran of its new capabilities and of the U.S. and GCC reactions to them. In response to Iran s growing capabilities and cyber activism, Gulf nations have begun to increase their defensive capabilities. A series of politically motivated incidents targeting Gulf media outlets, attributed to the Syrian Electronic Army and to the hacker group Anonymous (although this could be anyone), have increased Gulf states concerns. The United 1616 rhode island ave nw, washington dc p f

4 4 CSIS Middle East Program Gulf Analysis Paper The combination of the attacks on Aramco and the banks is best seen as a test by Iran of its new capabilities and of the U.S. and GCC reactions to them. Arab Emirates (UAE) has had a cyber capability for some time, largely provided by outside contractors, but in 2012 it introduced cybercrime legislation and established a new national authority for cybersecurity, the National Electronic Security Authority (NESA). NESA is an independent agency linked to the UAE Supreme National Security Council, and it was created through a special federal decree issued by the UAE s president. NESA s mandate is to defend against attacks on military and critical infrastructure and oversee cybersecurity across all government agencies. The cybersecurity concerns of GCC states mirror their broader strategic objectives: preserving domestic political control, containing Iranian ambitions (with the United States as a counterbalance), and maintaining an uneasy balance between cooperation and competition with their neighbors. The United States has encouraged and assisted GCC states in improving their cyber defenses. This includes some direct assistance (in the form of advice and technology) and through the services of U.S. contractors. Qatar began its own cybersecurity initiative in February 2013, with Saudi Arabia and Bahrain. 9 Kuwait reportedly entered into a $1 billion program on physical security and cybersecurity with the United Kingdom. 10 Bahrain, after experiencing annoyance attacks attributed to Anonymous, is paying greater attention to cybersecurity, working with Western contractors; whether this will translate into tangible improvements remains to be seen. Bahrain also arrested hackers from the February 14 Revolution Youth Coalition and accused them of having ties to Iran, reflecting the expanded use of cybersecurity to control political dissent across the region. 11 There are also efforts to strengthen the GCC s cooperation in cybersecurity. These have not yet produced tangible results, but if the GCC were to become a hub for sharing threat and mitigation information among its members, it would significantly improve cyber defenses. Gulf countries have something of an advantage in developing cyber defenses given the high degree of control already exercised by governments over national telecommunications companies. Cooperating with the United States and others in the face of Iranian belligerence and committing the resources to invest in cybersecurity efforts would enable Gulf countries to build on the advantage of being well-resourced and exercising a high degree of control over their national telecommunications networks. External Actors The Internet eliminates distance and provides a new way for outside nations to intervene in the Gulf region. The primary focus has been intelligence collection, but nations have also used cyber techniques for political influence and for covert action. Iran is a hard target for intelligence collection. Western nations, with the United States foremost among them, have been quick to add cyber capabilities to the intelligence collection assets they already deploy to monitor Iran. U.S. interests are aimed at slowing Iran s nuclear program and improving the cyber defenses of friendly nations in order to reduce risks to regional stability. Media accounts ascribe various covert actions against Iranian targets to the United States (the most famous being Stuxnet, identified in the press as part of a larger covert cyber operation named Olympic Games ). Israel has been the target of sustained efforts by Iran to hack into and disrupt Israeli networks, and while Iran has had only limited success, Israel has itself not been shy about using its advanced cyber capabilities for purposes of espionage and, perhaps, attack. China does not seem to have played a major role in the Gulf (there is no public evidence of support for Iran from China for malicious cyber activity), although given the pattern of China s activities in the rest of the world, it is reasonable to speculate that it has engaged in espionage against Gulf energy companies to gather commercially valuable information. Russia s calculations may be somewhat different, as the activity in the Gulf appears to have served as a vehicle for demonstrating larger Russian concerns about the Internet. Russia, for example, supported the International Telecommunications Union (ITU) when it hired a Russian firm with links to the Federal Security Service (FSB) to in- center for strategic and international studies middle east program

5 CSIS Middle East Program Gulf Analysis Paper 5 vestigate cybersecurity problems in the Gulf. This ITU activity was unprecedented. It could simply be coincidence that these efforts act to reinforce other Russian efforts to place the ITU at the center of cybersecurity putting the Internet, like global telephone communications, under its purview. Revelations about Flame and Stuxnet served, perhaps fortuitously, the larger Russian political agenda on Internet governance, which seeks to establish tighter political control over uses of the Internet and to undercut U.S. hegemony. Gulf states are sympathetic to Russian views on controlling content and supported Russian internet governance ideas at the World Conference on International Telecommunications held in Dubai in December Cybersecurity provides a low-cost means for Russia to play a role in the Gulf. The Future of Cybersecurity in the Gulf Cyberspace has become an arena for covert struggle, with the United States, Israel and the GCC on one side, and Iran and Russia on the other. Iran s nuclear program is a magnet for cyber espionage, and Iran itself has discovered the value of cyberattack. This covert struggle spills over into Iran s regional neighbors. Iran and external actors like the United States, Israel, and Russia will continue to use cyber techniques for covert activities to achieve national goals. In the Gulf as in the rest of the world, cyberattack provides a new tool for nations to use in existing disputes. The variables that affect the likelihood of future cyberattack are the state of relations between Iran, its neighbors, and important external actors; the perceived likelihood of attribution; and the quality of Gulf nations cyber defenses. With the global spotlight on the Gulf and Iran, the risk of a major cyberattack in the Gulf may actually be reduced (although by how much we cannot say certainly not enough that GCC states can afford not to take their defenses seriously). Part of Iran s calculation in using cyber tools is the probability of detection, attribution and retribution (political or military, covert or overt). Since the likelihood of attribution has increased and it would be beneficial to ensure Iranian awareness of this Iran may be less interested in using cyberattacks. This assumes, of course that the Iranians believe they will be detected, that they care about the foreign reaction, and that they will conclude that the risks of cyberattacks outweigh the benefits. Collective defense among Gulf states remains problematic, as it does in other security areas. The United States can play a brokering role. States reluctant to cooperate directly with each other can use bilateral cooperation with the United States in cybersecurity as an indirect mechanism for coordination. This is not an ideal situation, but it is better than uncoordinated individual efforts. If the Gulf did not face larger security problems, cybersecurity would be a much smaller issue, perhaps limited to financial crime and commercial espionage against oil companies. As it is, with the increased attention to cybersecurity and the increased awareness of Iranian activities (and Israeli capabilities), all sides in the cyber contest are now wary and increasingly prepared. At the moment, Iran leads the Gulf region when it comes to cyber capabilities, although it faces powerful external antagonists. To raise the costs for Iran of using cyber weapons, the GCC states will need to dramatically strengthen their own cyber capabilities and expand their existing security partnerships to address cybersecurity. A failure to do so will raise the risk of cyberattacks that could trigger wider regional conflict. About the Author James Andrew Lewis is a senior fellow and director of the Strategic Technologies Program at CSIS, where he writes on technology, security, and the international economy. Before joining CSIS, he worked at the Departments of State and Commerce as a Foreign Service officer and as a member of the Senior Executive Service. His government experience includes work on a range of politico-military and intelligence issues. He was the rapporteur for both the 2010 and 2013 UN Group of Government Experts on Information Security. Lewis has authored numerous publications since coming to CSIS, publishing a series of reports and essays exploring the relationship between technology and national power. He is an internationally recognized expert on technology and strategy whose work includes the report Securing Cyberspace for the 44th Presidency (CSIS, 2008). Lewis led a long-running track II dialogue on cybersecurity with China. His remarks appear frequently in the media, and he has testified numerous times before Congress. His current research examines international security and governance in cyberspace and the effect of the Internet on politics. Lewis received his Ph.D. from the University of Chicago rhode island ave nw, washington dc p f

6 6 CSIS Middle East Program Gulf Analysis Paper Notes 1. I would like to thank Eneken Tikk-Ringas for her very helpful comments. 2. Clifford Stoll s The Cuckoo s Egg: Tracking a Spy through the Maze of Computer Espionage (New York: Doubleday, 1989) details Soviet cyber espionage in the 1980s. U.S. officials have described the use of primitive cyber attacks against Serbia in the 1990s. 3. Stars is a virus Iran claims to have discovered attacking its networks in Duqu is an espionage program that collects information from infected computers. Mahdi, designed for remote listening and control, affected networks in Iran and four other Middle Eastern countries in Shamoon wiped data from 30,000 computers belonging to Saudi Aramco in Flame can capture a broad array of information and has affected computers in Iran, Israel, Lebanon, Sudan, Egypt, Syria, and Saudi Arabia. 4. The motives and actors in the murder of a senior IRGC official remain unclear; the IRGC itself has said it was not an assassination and the investigation of the incident continues. Iran Denies Cyber War Commander Mojtaba Ahmadi was Assassinated, IB Times UK, October 3, 2013, 5. Fake DigiNotar web certificate risk to Iranians, BBC, September 5, 2011, technology Ahmad Rezaie, General Araghi: Iran is Ready For Any Hard and Soft Wars, Kabir News, September 25, 2012, 8. Ellen Nakashima, Iran blamed for cyber attacks on U.S. banks and companies, Washington Post, September 21, 2012, world/ _1_web-sites-quds-force-cyberattacks. 7. Iran government develops National Internet to combat international Internet s impact, Reporters Without Borders, August 3, 2011, UK and Kuwait to announce security partnership, BBC, November 28, 2012, uk Bahrain arrests Iran-linked cyber group, Al Jazeera, June 13, 2013, middleeast/2013/06/ html. This analysis paper is produced by the Center for Strategic and International Studies (CSIS), a private, tax-exempt institution focusing on international public policy issues. Its research is nonpartisan and nonproprietary. CSIS does not take specific policy positions; accordingly, all views, positions, and conclusions expressed in this publication should be understood to be solely those of the author(s) by the Center for Strategic and International Studies. CSIS MIDDLE EAST PROGRAM Jon B. Alterman Director and Zbigniew Brzezinski Chair in Global Security and Geostrategy Haim Malka Deputy Director and Senior Fellow Carolyn Barnett Research Fellow Rebecka Shirazi Program Coordinator and Research Associate Jason Mullins Research Assistant Breanna Thompson Intern Please visit our website at to learn more about the program s work. 9. Joseph Varghese, Ministry planning cyber security system for Qatar, Gulf Times, February 12, 2013, center for strategic and international studies middle east program

Cybersecurity. Canisius College

Cybersecurity. Canisius College Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations

More information

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. June 15th, 2015

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. June 15th, 2015 UNCLASSIFIED Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI June 15th, 2015 This document was prepared by The Institute for National Security Studies (INSS) Israel and The Cyber Security Forum

More information

Research Note Engaging in Cyber Warfare

Research Note Engaging in Cyber Warfare Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines

More information

working group on foreign policy and grand strategy

working group on foreign policy and grand strategy A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

More information

Open Hearing. U.S. House of Representatives. Subcommittee on the Middle East and South Asia. "Axis of Abuse: U.S. Human Rights Policy

Open Hearing. U.S. House of Representatives. Subcommittee on the Middle East and South Asia. Axis of Abuse: U.S. Human Rights Policy Open Hearing U.S. House of Representatives Subcommittee on the Middle East and South Asia "Axis of Abuse: U.S. Human Rights Policy toward Iran and Syria, Part II" Testimony by Mehdi Khalaji, senior fellow

More information

NATO & Cyber Conflict: Background & Challenges

NATO & Cyber Conflict: Background & Challenges NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented

More information

UN Emergency Summit on Cyber Security Topic Abstract

UN Emergency Summit on Cyber Security Topic Abstract UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international

More information

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps Agenda Introduction to SCADA Importance of SCADA security Recommended steps SCADA systems are usually highly complex and SCADA systems are used to control complex industries Yet.SCADA systems are actually

More information

the Council of Councils initiative

the Council of Councils initiative Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global

More information

The International Context for Cybersecurity

The International Context for Cybersecurity THE TRILATERAL COMMISSION 2011 WASHINGTON MEETING SESSION ON CYBERSECURITY Saturday, April 9, 2011 The International Context for Cybersecurity James A. Lewis Center for Strategic and International Studies

More information

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace

More information

People s Mojahedin Organization of Iran (Pmoi/Mek) 10 October 2012. 1. Identifying one of the agencies to skirt sanctions in the office of Ahmadinejad

People s Mojahedin Organization of Iran (Pmoi/Mek) 10 October 2012. 1. Identifying one of the agencies to skirt sanctions in the office of Ahmadinejad People s Mojahedin Organization of Iran (Pmoi/Mek) 10 October 2012 1. Identifying one of the agencies to skirt sanctions in the office of Ahmadinejad One of the agencies in the presidential office assigned

More information

White Paper: Cyber Hawk or Digital Dove

White Paper: Cyber Hawk or Digital Dove White Paper: Cyber Hawk or Digital Dove Published By: SkillBridge, LLC September 18, 2013 Today s Modern Warfare With the recent debate over whether or not the United States should take military action

More information

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure New York State Energy Planning Board Cyber Security and the Energy Infrastructure New York State Division of Homeland Security and Emergency Services Office of Cyber Security Office of Cyber Security Overview

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge

Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge Cybercrime Bedrohung, Intervention, Abwehr BKA-Herbsttagung vom 12. - 13. November 2013 Cybersecurity strategic-political aspects of this global challenge Full version Michael Daniel Special Assistant

More information

ASIA: THE CYBERSECURITY BATTLEGROUND

ASIA: THE CYBERSECURITY BATTLEGROUND Statement before the House Foreign Affairs Committee, Subcommittee on Asia and the Pacific ASIA: THE CYBERSECURITY BATTLEGROUND A Statement by James A. Lewis Director and Senior Fellow, Technology and

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

James R. Clapper. Director of National Intelligence

James R. Clapper. Director of National Intelligence Statement for the Record Worldwide Cyber Threats House Permanent Select Committee on Intelligence James R. Clapper Director of National Intelligence September 10, 2015 STATEMENT FOR THE RECORD Worldwide

More information

A Reluctant Cyber Security Agreement between the US and China

A Reluctant Cyber Security Agreement between the US and China 16 November, 2015 A Reluctant Cyber Security Agreement between the US and China Dr. Omair Anas* Three months after the biggest data theft from the American networks, the US and China have agreed to cooperate

More information

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states. Cyberterror Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states. What are terrorists main uses of cyberspace? How does cyberterror

More information

Option 1: Use the Might of the U.S. Military to End the Assad Regime

Option 1: Use the Might of the U.S. Military to End the Assad Regime 1 Option 1: Use the Might of the U.S. Military to End the Assad Regime The Syrian dictatorship s use of chemical weapons against its own people was terrible. But we must not let it overshadow the larger

More information

Foreign Policy Responses to International Cyber-attacks Some Lessons Learned

Foreign Policy Responses to International Cyber-attacks Some Lessons Learned september 2015 Foreign Policy Responses to International Cyber-attacks Some Lessons Learned How could foreign policy instruments be helpful in responding to major cyber-attacks? This policy brief provides

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President

More information

Cedric Leighton, Colonel, USAF (Ret) Founder & President, Cedric Leighton Associates

Cedric Leighton, Colonel, USAF (Ret) Founder & President, Cedric Leighton Associates Cedric Leighton, Colonel, USAF (Ret) Founder & President, Cedric Leighton Associates What is Cyber Security? The First Cyber Attack The Threat Landscape The Energy Industry as a Target The Legal & Regulatory

More information

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,

More information

Trends Concerning Cyberspace

Trends Concerning Cyberspace Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming

More information

A Region by Any Other Name...

A Region by Any Other Name... A Region by Any Other Name.... Janet Hall Bethany Public Schools, Bethany, Oklahoma [email protected] OVERVIEW: It is often true that a place may be categorized as belonging to more than one region,

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

Michael Yakushev PIR-Center, Moscow (Russia)

Michael Yakushev PIR-Center, Moscow (Russia) Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:

More information

VIENNA MODEL UNITED NATIONS CLUB

VIENNA MODEL UNITED NATIONS CLUB VIENNA MODEL UNITED NATIONS CLUB STUDY GUIDE APRIL SESSION 2013 CYBER SECURITYAND CYBER WARFARE 1 INTRODUCTION With anever-increasingnumber of technological improvements and the expansion of online services

More information

A Detailed Strategy for Managing Corporation Cyber War Security

A Detailed Strategy for Managing Corporation Cyber War Security A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait [email protected] ABSTRACT Modern corporations

More information

Cyber defence in the EU Preparing for cyber warfare?

Cyber defence in the EU Preparing for cyber warfare? Preparing for cyber warfare? SUMMARY In recent years, cyber attacks on a serious scale have become a matter of concern to states, due to the threat they can pose to national security, but also a potential

More information

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

The main object of my research is :

The main object of my research is : The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is

More information

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view

More information

Confidence-building and international agreement in cybersecurity

Confidence-building and international agreement in cybersecurity Confidence-building and international agreement in cybersecurity James Andrew Lewis The global digital network has become the backbone of the world economy and a significant new venue for attack, but there

More information

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term

More information

Harmful Interference into Satellite Telecommunications by Cyber Attack

Harmful Interference into Satellite Telecommunications by Cyber Attack Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,

More information

It's a MAD, MAD, MAD Cyber World

It's a MAD, MAD, MAD Cyber World It's a MAD, MAD, MAD Cyber World Remarks by Rod Beckstrom at the Personal Democracy Forum New York City June 6, 2013 As prepared for delivery EMBARGOED FOR RELEASE AT 16.00 EST, 06 JUNE 2013 Let s start

More information

U.S.-Japan Cooperation in Cybersecurity

U.S.-Japan Cooperation in Cybersecurity NOVEMBER 2015 1616 Rhode Island Avenue NW Washington, DC 20036 202-887-0200 www.csis.org Cover photo: www.shutterstock.com U.S.-Japan Cooperation in Cybersecurity A Report of the CSIS Strategic Technologies

More information

The Plight of Christians in the Middle East. Supporting Religious Freedom, Pluralism, and Tolerance During a Time of Turmoil

The Plight of Christians in the Middle East. Supporting Religious Freedom, Pluralism, and Tolerance During a Time of Turmoil AP PHOTO/HUSSEIN MALLA The Plight of Christians in the Middle East Supporting Religious Freedom, Pluralism, and Tolerance During a Time of Turmoil By Brian Katulis, Rudy deleon, and John Craig March 2015

More information

The Implication of TMD System in Japan to China s Security

The Implication of TMD System in Japan to China s Security The Sixth ISODARCO Beijing Seminar on Arms Control October 29-Novermber 1, 1998 Shanghai, China The Implication of TMD System in Japan to China s Security Institute of World Economics & Politics Chinese

More information

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note A Community Position paper on Law of CyberWar Paul Shaw 12 October 2013 Author note This law and cyberwar paper / quasi-treatise was originally written for a course in a CISO certification curriculum,

More information

RUSSIA CHINA NEXUS IN CYBER SPACE

RUSSIA CHINA NEXUS IN CYBER SPACE RUSSIA CHINA NEXUS IN CYBER SPACE E. Dilipraj Associate Fellow, CAPS On May 08, 2015 Russia and China inked an important agreement in the field of cyber security. This bilateral agreement is the latest

More information

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting

More information

Arab revolutions: Why West was caught off-guard

Arab revolutions: Why West was caught off-guard Arab revolutions: Why West was caught off-guard In early November, Mondial interviewed Ziad Abdel Samad, Executive Director of the Arab NGO Network for Development (ANND, based in Beirut). ANND is a regional

More information

Foreign Affairs and National Security

Foreign Affairs and National Security Foreign Affairs and National Security Objectives: TLW understand and explain the following questions as it relates to the Foreign affairs of the American Government What is foreign policy? What is the

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

Andrzej Kozłowski Research Fellow Casimir pulaski Foundation. The cyber strikes back the retaliation against the cyberattack

Andrzej Kozłowski Research Fellow Casimir pulaski Foundation. The cyber strikes back the retaliation against the cyberattack Andrzej Kozłowski Research Fellow Casimir pulaski Foundation The cyber strikes back the retaliation against the cyberattack Road to WARSAW SECURITY FORUM 2015 The growing threat The constant grow of threats

More information

"Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information

Cyber War or Electronic Espionage - Active Defense or Hack Back David Willson Attorney at Law, CISSP Assess & Protect Corporate Information "Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information Iran Georgia France Estonia Attacks on Nations UK Belgium South

More information

Egypt s Regional Security Policy after the January 25 Revolution

Egypt s Regional Security Policy after the January 25 Revolution PERSPECTIVE FES NEW YORK Egypt s Regional Security Policy after the January 25 Revolution ABDUL-MONEM AL-MASHAT July 2012 After the ousting of the regime of President Mubarak, Egypt s position in the region

More information

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM IIA South Event 16 th June 2015 Cyber, Social Media and IT Risks 1 st and 2 nd Line Perspective David Canham (BA) Hons, MIRM Agenda This evening we ll cover the following: Who, why and what? Traditional

More information

POLSC653: INTERNATIONAL POLITICS OF MIDDLE EAST Kansas State University Fall 2015 T TH 9:30 10:45 am, Willard 115

POLSC653: INTERNATIONAL POLITICS OF MIDDLE EAST Kansas State University Fall 2015 T TH 9:30 10:45 am, Willard 115 Dr. Sabri Ciftci Waters Hall 222 Phone: 785 532 3514 Email: [email protected] POLSC653: INTERNATIONAL POLITICS OF MIDDLE EAST Kansas State University Fall 2015 T TH 9:30 10:45 am, Willard 115 Office Hours:

More information

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

Cyber Security Ultimately Is Military Security

Cyber Security Ultimately Is Military Security Cyber Security Ultimately Is Military Security Reporter: ZUO Xiaoyu You Ji Professor of Macau University, School of Social Sciences. Research Area: national security. With deepening development of cyber

More information

Viewpoint: Implementing Japan s New Cyber Security Strategy*

Viewpoint: Implementing Japan s New Cyber Security Strategy* Presented by: The ACCJ s Internet Economy Task Force Valid Through November 2014 The 2013 Cyber Security Strategy, released in June 2013, and the International Strategy on Cybersecurity Cooperation, released

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

Cyber security in the Middle East A strategic approach to protecting national digital assets and infrastructure. Strategy& is part of the PwC network

Cyber security in the Middle East A strategic approach to protecting national digital assets and infrastructure. Strategy& is part of the PwC network Cyber security in the Middle East A strategic approach to protecting national digital assets and infrastructure Strategy& is part of the PwC network Contacts About the authors Abu Dhabi Samer Bohsali Partner

More information

CYBERSECURITY: ASSESSING THE IMMEDIATE THREAT TO THE UNITED STATES

CYBERSECURITY: ASSESSING THE IMMEDIATE THREAT TO THE UNITED STATES Statement before the House Oversight and Government Reform Committee, Subcommittee on National Security, Homeland Defense, and Foreign Operations CYBERSECURITY: ASSESSING THE IMMEDIATE THREAT TO THE UNITED

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]

More information

Corporate Spying An Overview

Corporate Spying An Overview Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

Thank you for your very kind introduction.

Thank you for your very kind introduction. AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

CYBERSPACE SECURITY CONTINUUM

CYBERSPACE SECURITY CONTINUUM CYBERSPACE SECURITY CONTINUUM A People, Processes, and Technology Approach to Meeting Cyber Security Challenges in the 21 st Century 1 InterAgency Board 1550 Crystal Drive Suite 601, Arlington VA 22202

More information

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 1 Network and cybersecurity vs. access Fundamental tension exists between:

More information